System stringclasses 1 value | User stringlengths 139 142 | Assistant stringlengths 279 328k |
|---|---|---|
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-51112, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-51112 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-51112
- **State**: PUBLISHED
- **Published Date**: January 06, 2025 at 00:00 UTC
- **Last Updated**: January 07, 2025 at 14:15 UTC
- **Reserved Date**: October 28, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Open Redirect vulnerability in Pnetlab 5.3.11 allows an attacker to manipulate URLs to redirect users to arbitrary external websites via a crafted script
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://pnetlab.com)
2. [](https://github.com/Zehraakmanlar/Bortecine-s_CVEs/blob/main/README.md) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-24479, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-24479 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-24479
- **State**: PUBLISHED
- **Published Date**: August 02, 2021 at 10:32 UTC
- **Last Updated**: August 03, 2024 at 19:35 UTC
- **Reserved Date**: January 14, 2021 at 00:00 UTC
- **Assigned By**: WPScan
### Vulnerability Description
The DrawBlog WordPress plugin through 0.90 does not sanitise or validate some of its settings before outputting them back in the page, leading to an authenticated stored Cross-Site Scripting issue
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Unknown - DrawBlog**
Affected versions:
- 0.90 (Status: affected)
### References
1. [](https://wpscan.com/vulnerability/5fd2246a-fbd9-4f2a-8b0b-a64c3f91157c)
### Credits
- ABISHEIK M |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4688, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4688 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4688
- **State**: PUBLISHED
- **Published Date**: December 31, 2012 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 20:57 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.us-cert.gov/control_systems/pdf/ICSA-12-362-01.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8839, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8839 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8839
- **State**: PUBLISHED
- **Published Date**: May 02, 2016 at 10:00 UTC
- **Last Updated**: August 06, 2024 at 08:29 UTC
- **Reserved Date**: April 01, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugzilla.redhat.com/show_bug.cgi?id=1323577)
2. [USN-3006-1](http://www.ubuntu.com/usn/USN-3006-1)
3. [1035455](http://www.securitytracker.com/id/1035455)
4. [](https://github.com/torvalds/linux/commit/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b)
5. [USN-3005-1](http://www.ubuntu.com/usn/USN-3005-1)
6. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea3d7209ca01da209cda6f0dea8be9cc4b7a933b)
7. [RHSA-2017:2669](https://access.redhat.com/errata/RHSA-2017:2669)
8. [[oss-security] 20160401 Re: ext4 data corruption due to punch hole races](http://www.openwall.com/lists/oss-security/2016/04/01/4)
9. [85798](http://www.securityfocus.com/bid/85798)
10. [RHSA-2017:2077](https://access.redhat.com/errata/RHSA-2017:2077)
11. [USN-3007-1](http://www.ubuntu.com/usn/USN-3007-1)
12. [RHSA-2017:1842](https://access.redhat.com/errata/RHSA-2017:1842)
13. [[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html)
14. [[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update](https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-4285, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-4285 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-4285
- **State**: PUBLISHED
- **Published Date**: August 09, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 14:53 UTC
- **Reserved Date**: August 09, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Unspecified vulnerability in Cisco IOS and Cisco IOS XR 12.x up to 12.3, including some versions before 12.3(15) and 12.3(14)T, allows remote attackers to obtain sensitive information (partial packet contents) or cause a denial of service (router or component crash) via crafted IPv6 packets with a Type 0 routing header.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26359](http://secunia.com/advisories/26359)
2. [20070808 Cisco IOS Information Leakage Using IPv6 Routing Header](http://www.cisco.com/en/US/products/products_security_advisory09186a0080899647.shtml)
3. [cisco-ios-ipv6-header-dos(35906)](https://exchange.xforce.ibmcloud.com/vulnerabilities/35906)
4. [1018542](http://www.securitytracker.com/id?1018542)
5. [oval:org.mitre.oval:def:5840](https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5840)
6. [ADV-2007-2819](http://www.vupen.com/english/advisories/2007/2819) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-21212, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-21212 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-21212
- **State**: PUBLISHED
- **Published Date**: April 28, 2020 at 15:36 UTC
- **Last Updated**: August 05, 2024 at 12:26 UTC
- **Reserved Date**: April 20, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, D7800 before 1.0.1.30, EX2700 before 1.0.1.28, R6100 before 1.0.1.20, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WN2000RPTv3 before 1.0.1.20, WN3000RPv3 before 1.0.2.50, WN3100RPv2 before 1.0.0.56, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://kb.netgear.com/000055137/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2490) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-1170, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-1170 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-1170
- **State**: PUBLISHED
- **Published Date**: November 14, 2019 at 16:29 UTC
- **Last Updated**: August 06, 2024 at 18:53 UTC
- **Reserved Date**: February 14, 2012 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
Moodle before 2.2.2 has an external enrolment plugin context check issue where capability checks are not thorough
### Affected Products
**Moodle - Moodle**
Affected versions:
- 2.2 to 2.2.1+ (Status: affected)
### References
1. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html)
2. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html)
3. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html)
4. [](https://security-tracker.debian.org/tracker/CVE-2012-1170)
5. [](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1170)
6. [](https://access.redhat.com/security/cve/cve-2012-1170)
7. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html)
8. [](http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html)
9. [](https://moodle.org/mod/forum/discuss.php?d=198632) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-0443, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-0443 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-0443
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 22:00 UTC
- **Last Updated**: November 26, 2024 at 14:23 UTC
- **Reserved Date**: November 27, 2017 at 00:00 UTC
- **Assigned By**: cisco
### Vulnerability Description
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper input validation on fields within CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending malicious CAPWAP Discovery Request packets to the Cisco WLC Software. A successful exploit could allow the attacker to cause the Cisco WLC Software to disconnect associated access points (APs). While the APs disconnect and reconnect, service will be unavailable for a brief period of time, resulting in a DoS condition.
### Weakness Classification (CWE)
- CWE-399: Security Weakness
### Affected Products
**Cisco - Cisco Wireless LAN Controller (WLC)**
Affected versions:
- n/a (Status: affected)
### References
1. [20181017 Cisco Wireless LAN Controller Software Control and Provisioning of Wireless Access Points Protocol Denial of Service Vulnerability](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-capwap-dos)
2. [1041922](http://www.securitytracker.com/id/1041922)
3. [105686](http://www.securityfocus.com/bid/105686) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-5052, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-5052 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-5052
- **State**: PUBLISHED
- **Published Date**: May 21, 2025 at 21:00 UTC
- **Last Updated**: May 22, 2025 at 18:45 UTC
- **Reserved Date**: May 21, 2025 at 13:28 UTC
- **Assigned By**: VulDB
### Vulnerability Description
A vulnerability classified as critical was found in FreeFloat FTP Server 1.0. Affected by this vulnerability is an unknown functionality of the component LS Command Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
### CVSS Metrics
- **CVSS Base Score**: 7.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-120: Security Weakness
- CWE-119: Security Weakness
### Affected Products
**FreeFloat - FTP Server**
Affected versions:
- 1.0 (Status: affected)
### References
1. [VDB-309871 | FreeFloat FTP Server LS Command buffer overflow](https://vuldb.com/?id.309871)
2. [VDB-309871 | CTI Indicators (IOB, IOC)](https://vuldb.com/?ctiid.309871)
3. [Submit #581284 | FreeFloat FTP Server 1.0.0 Buffer Overflow](https://vuldb.com/?submit.581284)
4. [](https://fitoxs.com/exploit/exploit-bbcf0f842f1c5385430b6992995a8eb068c58dfbaae38ffb7df1d2c69041bc7c1.txt)
### Credits
- Fernando Mengali (VulDB User) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5523, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5523 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5523
- **State**: PUBLISHED
- **Published Date**: April 01, 2019 at 17:11 UTC
- **Last Updated**: August 04, 2024 at 20:01 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: vmware
### Vulnerability Description
VMware vCloud Director for Service Providers 9.5.x prior to 9.5.0.3 update resolves a Remote Session Hijack vulnerability in the Tenant and Provider Portals. Successful exploitation of this issue may allow a malicious actor to access the Tenant or Provider Portals by impersonating a currently logged in session.
### Affected Products
**VMware - VMware vCloud Director for Service Providers (vCD)**
Affected versions:
- 9.5.x before 9.5.0.3 (Status: affected)
### References
1. [](http://packetstormsecurity.com/files/152289/VMware-Security-Advisory-2019-0004.html)
2. [107638](http://www.securityfocus.com/bid/107638)
3. [](https://www.vmware.com/security/advisories/VMSA-2019-0004.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-21381, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-21381 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-21381
- **State**: PUBLISHED
- **Published Date**: March 11, 2021 at 00:00 UTC
- **Last Updated**: August 03, 2024 at 18:09 UTC
- **Reserved Date**: December 22, 2020 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sources, or check the contents of the exported `.desktop` files in `exports/share/applications/*.desktop` (typically `~/.local/share/flatpak/exports/share/applications/*.desktop` and `/var/lib/flatpak/exports/share/applications/*.desktop`) to make sure that literal filenames do not follow `@@` or `@@u`.
### CVSS Metrics
- **CVSS Base Score**: 7.1/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-74: Security Weakness
### Affected Products
**flatpak - flatpak**
Affected versions:
- >= 0.9.4, < 1.10.2 (Status: affected)
### References
1. [](https://github.com/flatpak/flatpak/security/advisories/GHSA-xgh4-387p-hqpp)
2. [](https://github.com/flatpak/flatpak/pull/4156)
3. [](https://github.com/flatpak/flatpak/commit/8279c5818425b6812523e3805bbe242fb6a5d961)
4. [](https://github.com/flatpak/flatpak/commit/a7401e638bf0c03102039e216ab1081922f140ae)
5. [](https://github.com/flatpak/flatpak/commit/eb7946bb6248923d8c90fe9b84425fef97ae580d)
6. [](https://github.com/flatpak/flatpak/releases/tag/1.10.2)
7. [DSA-4868](https://www.debian.org/security/2021/dsa-4868)
8. [FEDORA-2021-26ad138ffa](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXNVFOIB6ZP4DGOVKAM25T6OIEP3YLGV/)
9. [FEDORA-2021-fe7decc595](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MXXLXC2DPJ45HSMTI5MZYHMYEGQN6AA/)
10. [GLSA-202312-12](https://security.gentoo.org/glsa/202312-12) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0132, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0132 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0132
- **State**: PUBLISHED
- **Published Date**: September 26, 2024 at 05:18 UTC
- **Last Updated**: September 27, 2024 at 03:55 UTC
- **Reserved Date**: December 02, 2023 at 00:42 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
### CVSS Metrics
- **CVSS Base Score**: 9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-367: Security Weakness
### Affected Products
**NVIDIA - Container Toolkit**
Affected versions:
- All versions up to and including v1.16.1 (Status: affected)
**NVIDIA - GPU Operator**
Affected versions:
- All versions up to and including 24.6.1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5582) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-7287, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-7287 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-7287
- **State**: PUBLISHED
- **Published Date**: April 21, 2011 at 10:00 UTC
- **Last Updated**: September 16, 2024 at 18:03 UTC
- **Reserved Date**: April 20, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple memory leaks in the (1) ldap_init and (2) ldap_url_search_direct API functions in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-LA0007 allow remote authenticated users to cause a denial of service (memory consumption) by making many function calls.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [IO09650](http://www.ibm.com/support/docview.wss?uid=swg1IO09650)
2. [](http://www.ibm.com/support/docview.wss?uid=swg24029663) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-49712, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-49712 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-49712
- **State**: REJECTED
- **Last Updated**: February 13, 2025 at 17:18 UTC
- **Reserved Date**: February 01, 2024 at 21:32 UTC
- **Assigned By**: f5
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-9019, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-9019 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-9019
- **State**: PUBLISHED
- **Published Date**: November 20, 2014 at 17:00 UTC
- **Last Updated**: August 06, 2024 at 13:33 UTC
- **Reserved Date**: November 20, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities in ZTE ZXDSL 831CII allow remote attackers to hijack the authentication of administrators for requests that (1) change the admin user name or (2) conduct cross-site scripting (XSS) attacks via the sysUserName parameter in a save action to adminpasswd.cgi or (3) change the admin user password via the sysPassword parameter in a save action to adminpasswd.cgi.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141106 ZTE 831CII Multiple Vulnerablities](http://www.securityfocus.com/archive/1/533930/100/0/threaded)
2. [](http://packetstormsecurity.com/files/129016/ZTE-831CII-Hardcoded-Credential-XSS-CSRF.html)
3. [zte831cii-adminpasswd-csrf(98585)](https://exchange.xforce.ibmcloud.com/vulnerabilities/98585)
4. [70984](http://www.securityfocus.com/bid/70984) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-32596, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-32596 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-32596
- **State**: PUBLISHED
- **Published Date**: April 18, 2024 at 08:31 UTC
- **Last Updated**: August 02, 2024 at 02:13 UTC
- **Reserved Date**: April 15, 2024 at 10:26 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver Mächler DSGVO Youtube allows Stored XSS.This issue affects DSGVO Youtube: from n/a through 1.4.5.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Eric-Oliver Mächler - DSGVO Youtube**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://patchstack.com/database/vulnerability/dsgvo-youtube/wordpress-dsgvo-youtube-plugin-1-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve)
### Credits
- LVT-tholv2k (Patchstack Alliance) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-34222, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-34222 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-34222
- **State**: PUBLISHED
- **Published Date**: May 31, 2023 at 13:03 UTC
- **Last Updated**: January 09, 2025 at 20:32 UTC
- **Reserved Date**: May 31, 2023 at 12:49 UTC
- **Assigned By**: JetBrains
### Vulnerability Description
In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible
### CVSS Metrics
- **CVSS Base Score**: 4.6/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N`
### Affected Products
**JetBrains - TeamCity**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://www.jetbrains.com/privacy-security/issues-fixed/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-5830, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-5830 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-5830
- **State**: PUBLISHED
- **Published Date**: November 21, 2012 at 11:00 UTC
- **Last Updated**: August 06, 2024 at 21:21 UTC
- **Reserved Date**: November 05, 2012 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [USN-1638-3](http://www.ubuntu.com/usn/USN-1638-3)
2. [51370](http://secunia.com/advisories/51370)
3. [USN-1638-2](http://www.ubuntu.com/usn/USN-1638-2)
4. [](https://bugzilla.mozilla.org/show_bug.cgi?id=775228)
5. [openSUSE-SU-2012:1586](http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html)
6. [USN-1636-1](http://www.ubuntu.com/usn/USN-1636-1)
7. [openSUSE-SU-2013:0175](http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html)
8. [RHSA-2012:1483](http://rhn.redhat.com/errata/RHSA-2012-1483.html)
9. [firefox-html-file-code-execution(80183)](https://exchange.xforce.ibmcloud.com/vulnerabilities/80183)
10. [RHSA-2012:1482](http://rhn.redhat.com/errata/RHSA-2012-1482.html)
11. [51434](http://secunia.com/advisories/51434)
12. [openSUSE-SU-2012:1583](http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html)
13. [51439](http://secunia.com/advisories/51439)
14. [51440](http://secunia.com/advisories/51440)
15. [USN-1638-1](http://www.ubuntu.com/usn/USN-1638-1)
16. [SUSE-SU-2012:1592](http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html)
17. [](http://www.mozilla.org/security/announce/2012/mfsa2012-106.html)
18. [51359](http://secunia.com/advisories/51359)
19. [openSUSE-SU-2012:1585](http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html)
20. [51381](http://secunia.com/advisories/51381)
21. [87598](http://osvdb.org/87598)
22. [51369](http://secunia.com/advisories/51369)
23. [51360](http://secunia.com/advisories/51360) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-42705, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-42705 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-42705
- **State**: PUBLISHED
- **Published Date**: November 22, 2021 at 19:06 UTC
- **Last Updated**: September 16, 2024 at 20:01 UTC
- **Reserved Date**: October 18, 2021 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**WECON - PLC Editor**
Affected versions:
- All (Status: affected)
### References
1. [](https://us-cert.cisa.gov/ics/advisories/icsa-21-315-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-1912, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-1912 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-1912
- **State**: PUBLISHED
- **Published Date**: March 26, 2025 at 11:55 UTC
- **Last Updated**: March 26, 2025 at 13:19 UTC
- **Reserved Date**: March 03, 2025 at 22:52 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.0 via the validate_file() Function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
### CVSS Metrics
- **CVSS Base Score**: 7.6/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N`
### Weakness Classification (CWE)
- CWE-918: Server-Side Request Forgery (SSRF)
### Affected Products
**webtoffee - Product Import Export for WooCommerce – Import Export Product CSV Suite**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/406b52dc-3d36-4b03-a932-34f456395979?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php#L175)
3. [](https://wordpress.org/plugins/product-import-export-for-woo/#developers)
4. [](https://plugins.trac.wordpress.org/changeset/3261194/)
### Credits
- Hay Mizrachi |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-0950, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-0950 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-0950
- **State**: PUBLISHED
- **Published Date**: January 29, 2013 at 02:00 UTC
- **Last Updated**: August 06, 2024 at 14:41 UTC
- **Reserved Date**: January 10, 2013 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://support.apple.com/kb/HT5642)
2. [APPLE-SA-2013-03-14-2](http://lists.apple.com/archives/security-announce/2013/Mar/msg00003.html)
3. [APPLE-SA-2013-01-28-1](http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-4872, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-4872 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-4872
- **State**: PUBLISHED
- **Published Date**: August 27, 2024 at 12:37 UTC
- **Last Updated**: April 11, 2025 at 14:01 UTC
- **Reserved Date**: May 14, 2024 at 14:41 UTC
- **Assigned By**: Hitachi Energy
### Vulnerability Description
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability
an attacker must have a valid credential.
### CVSS Metrics
- **CVSS Base Score**: 9.9/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-943: Code Injection
### Affected Products
**Hitachi Energy - MicroSCADA X SYS600**
Affected versions:
- 10.0 (Status: affected)
- 10.3 vulnerability patch 2025_01 (Status: unaffected)
- 10.4 vulnerability patch 2025_01 (Status: unaffected)
- 10.5 vulnerability patch 2025_01 (Status: unaffected)
**Hitachi Energy - MicroSCADA Pro SYS600**
Affected versions:
- 9.4 FP2 HF1 (Status: affected)
### References
1. [](https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-12919, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-12919 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-12919
- **State**: REJECTED
- **Published Date**: June 11, 2021 at 21:41 UTC
- **Last Updated**: June 11, 2021 at 21:41 UTC
- **Reserved Date**: May 15, 2020 at 00:00 UTC
- **Assigned By**: AMD
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-7563, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-7563 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-7563
- **State**: PUBLISHED
- **Published Date**: November 18, 2020 at 13:50 UTC
- **Last Updated**: August 04, 2024 at 09:33 UTC
- **Reserved Date**: January 21, 2020 at 00:00 UTC
- **Assigned By**: schneider
### Vulnerability Description
A CWE-787: Out-of-bounds Write vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause corruption of data, a crash, or code execution when uploading a specially crafted file on the controller over FTP.
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**n/a - Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details)**
Affected versions:
- Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) (Status: affected)
### References
1. [](https://www.se.com/ww/en/download/document/SEVD-2020-315-01/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-3441, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-3441 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-3441
- **State**: PUBLISHED
- **Published Date**: January 27, 2017 at 22:01 UTC
- **Last Updated**: October 08, 2024 at 20:13 UTC
- **Reserved Date**: December 06, 2016 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Customer Interaction History component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Interaction History accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
### Affected Products
**Oracle - Customer Interaction History**
Affected versions:
- 12.1.1 (Status: affected)
- 12.1.2 (Status: affected)
- 12.1.3 (Status: affected)
### References
1. [95573](http://www.securityfocus.com/bid/95573)
2. [](http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-2403, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-2403 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-2403
- **State**: PUBLISHED
- **Published Date**: July 20, 2021 at 22:44 UTC
- **Last Updated**: September 26, 2024 at 13:57 UTC
- **Reserved Date**: December 09, 2020 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### CVSS Metrics
- **CVSS Base Score**: 5.3/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N`
### Affected Products
**Oracle Corporation - WebLogic Server**
Affected versions:
- 10.3.6.0.0 (Status: affected)
- 12.1.3.0.0 (Status: affected)
- 12.2.1.3.0 (Status: affected)
- 12.2.1.4.0 (Status: affected)
- 14.1.1.0.0 (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpujul2021.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-6521, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-6521 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-6521
- **State**: PUBLISHED
- **Published Date**: January 23, 2017 at 21:00 UTC
- **Last Updated**: August 06, 2024 at 01:29 UTC
- **Reserved Date**: August 02, 2016 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Grails console (aka Grails Debug Console and Grails Web Console) 2.0.7, 1.5.10, and earlier allows remote attackers to hijack the authentication of users for requests that execute arbitrary Groovy code via unspecified vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [[oss-security] 20160801 CVE Request: CSRF in Grails console](http://www.openwall.com/lists/oss-security/2016/08/02/2)
2. [[oss-security] 20160802 Re: CVE Request: CSRF in Grails console](http://www.openwall.com/lists/oss-security/2016/08/02/11)
3. [](https://github.com/sheehan/grails-console/issues/54)
4. [92267](http://www.securityfocus.com/bid/92267)
5. [](https://github.com/sheehan/grails-console/issues/55)
6. [[oss-security] 20160803 Grails Console is still vulnerable to CSRF CVE-2016-6521](http://www.openwall.com/lists/oss-security/2016/08/03/9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-40738, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-40738 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-40738
- **State**: PUBLISHED
- **Published Date**: March 16, 2022 at 14:03 UTC
- **Last Updated**: April 23, 2025 at 18:47 UTC
- **Reserved Date**: September 08, 2021 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`
### Weakness Classification (CWE)
- CWE-788: OS Command Injection
### Affected Products
**Adobe - Audition**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/audition/apsb21-92.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-1000111, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-1000111 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-1000111
- **State**: PUBLISHED
- **Published Date**: March 13, 2018 at 13:00 UTC
- **Last Updated**: September 16, 2024 at 16:33 UTC
- **Reserved Date**: March 13, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An improper authorization vulnerability exists in Jenkins Subversion Plugin version 2.10.2 and earlier in SubversionStatus.java and SubversionRepositoryStatus.java that allows an attacker with network access to obtain a list of nodes and users.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://jenkins.io/security/advisory/2018-02-26/#SECURITY-724) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-35253, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-35253 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-35253
- **State**: PUBLISHED
- **Published Date**: June 11, 2024 at 17:00 UTC
- **Last Updated**: June 05, 2025 at 01:09 UTC
- **Reserved Date**: May 14, 2024 at 20:14 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Azure File Sync Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 4.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N/E:H/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-59: Security Weakness
### Affected Products
**Microsoft - Azure File Sync**
Affected versions:
- 16.0.0 (Status: affected)
**Microsoft - Azure File Sync**
Affected versions:
- 1.0.0 (Status: affected)
**Microsoft - Azure File Sync**
Affected versions:
- 17.0.0 (Status: affected)
### References
1. [Microsoft Azure File Sync Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35253) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2002-1071, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2002-1071 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2002-1071
- **State**: PUBLISHED
- **Published Date**: August 31, 2002 at 04:00 UTC
- **Last Updated**: August 08, 2024 at 03:12 UTC
- **Reserved Date**: August 30, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
ZyXEL Prestige 642R allows remote attackers to cause a denial of service in the Telnet, FTP, and DHCP services (crash) via a TCP packet with both the SYN and ACK flags set.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20020617 Re: ZyXEL 642R(-11) AJ.6 SYN-ACK, SYN-FIN DoS -- 643R testing](http://online.securityfocus.com/archive/1/277307)
2. [zyxel-tcp-packet-dos(9372)](http://www.iss.net/security_center/static/9372.php)
3. [5034](http://www.securityfocus.com/bid/5034)
4. [20020617 ZyXEL 642R(-11) AJ.6 SYN-ACK, SYN-FIN DoS](http://online.securityfocus.com/archive/1/277242)
5. [20020617 Follow: ZyXEL 642R-11 AJ.6 service DoS -- additional informations](http://online.securityfocus.com/archive/1/277303) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2008-0542, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2008-0542 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2008-0542
- **State**: PUBLISHED
- **Published Date**: February 01, 2008 at 19:41 UTC
- **Last Updated**: August 07, 2024 at 07:46 UTC
- **Reserved Date**: February 01, 2008 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Directory traversal vulnerability in thumbnail.php in Gerd Tentler Simple Forum 3.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [28681](http://secunia.com/advisories/28681)
2. [simpleforum-thumbnail-directory-traversal(39980)](https://exchange.xforce.ibmcloud.com/vulnerabilities/39980)
3. [4989](https://www.exploit-db.com/exploits/4989)
4. [27463](http://www.securityfocus.com/bid/27463) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-10924, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-10924 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-10924
- **State**: PUBLISHED
- **Published Date**: July 28, 2020 at 17:10 UTC
- **Last Updated**: August 04, 2024 at 11:14 UTC
- **Reserved Date**: March 24, 2020 at 00:00 UTC
- **Assigned By**: zdi
### Vulnerability Description
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9643.
### Weakness Classification (CWE)
- CWE-121: Stack-based Buffer Overflow
### Affected Products
**NETGEAR - R6700**
Affected versions:
- V1.0.4.84_10.0.58 (Status: affected)
### References
1. [](https://www.zerodayinitiative.com/advisories/ZDI-20-704/)
### Credits
- Pedro Ribeiro and Radek Domanski of Team Flashback |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-24578, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-24578 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-24578
- **State**: PUBLISHED
- **Published Date**: December 22, 2020 at 18:04 UTC
- **Last Updated**: August 04, 2024 at 15:19 UTC
- **Reserved Date**: August 21, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It has a misconfigured FTP service that allows a malicious network user to access system folders and download sensitive files (such as the password hash file).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-security-vulnerabilities-leading-to-rce/)
2. [](https://www.trustwave.com/en-us/resources/security-resources/security-advisories/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-13733, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-13733 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-13733
- **State**: PUBLISHED
- **Published Date**: July 09, 2018 at 06:00 UTC
- **Last Updated**: August 05, 2024 at 09:14 UTC
- **Reserved Date**: July 08, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mintToken function of a smart contract implementation for ProjectJ, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md)
2. [](https://github.com/BlockChainsSecurity/EtherTokens/tree/master/ProjectJ) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-4384, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-4384 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-4384
- **State**: REJECTED
- **Published Date**: March 16, 2018 at 14:04 UTC
- **Last Updated**: March 16, 2018 at 13:57 UTC
- **Reserved Date**: December 26, 2016 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-28201, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-28201 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-28201
- **State**: PUBLISHED
- **Published Date**: May 08, 2023 at 00:00 UTC
- **Last Updated**: January 29, 2025 at 18:55 UTC
- **Reserved Date**: March 13, 2023 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4. A remote user may be able to cause unexpected app termination or arbitrary code execution.
### Affected Products
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/HT213670)
2. [](https://support.apple.com/en-us/HT213671)
3. [](https://support.apple.com/en-us/HT213676)
4. [](https://support.apple.com/en-us/HT213674)
5. [](https://support.apple.com/en-us/HT213673) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-34289, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-34289 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-34289
- **State**: PUBLISHED
- **Published Date**: July 12, 2022 at 10:07 UTC
- **Last Updated**: August 03, 2024 at 09:07 UTC
- **Reserved Date**: June 22, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in PADS Standard/Plus Viewer (All versions). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted PCB files. This could allow an attacker to execute code in the context of the current process. (FG-VD-22-054)
### Weakness Classification (CWE)
- CWE-787: Out-of-bounds Write
### Affected Products
**Siemens - PADS Standard/Plus Viewer**
Affected versions:
- All versions (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-439148.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-49871, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-49871 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-49871
- **State**: PUBLISHED
- **Published Date**: October 21, 2024 at 18:01 UTC
- **Last Updated**: May 04, 2025 at 09:40 UTC
- **Reserved Date**: October 21, 2024 at 12:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
Input: adp5589-keys - fix NULL pointer dereference
We register a devm action to call adp5589_clear_config() and then pass
the i2c client as argument so that we can call i2c_get_clientdata() in
order to get our device object. However, i2c_set_clientdata() is only
being set at the end of the probe function which means that we'll get a
NULL pointer dereference in case the probe function fails early.
### Affected Products
**Linux - Linux**
Affected versions:
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
- 30df385e35a48f773b85117fc490152c2395e45b (Status: affected)
**Linux - Linux**
Affected versions:
- 5.11 (Status: affected)
- 0 (Status: unaffected)
- 5.15.168 (Status: unaffected)
- 6.1.113 (Status: unaffected)
- 6.6.55 (Status: unaffected)
- 6.10.14 (Status: unaffected)
- 6.11.3 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/4449fedb8a710043fc0925409eba844c192d4337)
2. [](https://git.kernel.org/stable/c/34e304cc53ae5d3c8e3f08b41dd11e0d4f3e01ed)
3. [](https://git.kernel.org/stable/c/7c3f04223aaf82489472d614c6decee5a1ce8d7f)
4. [](https://git.kernel.org/stable/c/9a38791ee79bd17d225c15a6d1479448be127a59)
5. [](https://git.kernel.org/stable/c/122b160561f6429701a0559a0f39b0ae309488c6)
6. [](https://git.kernel.org/stable/c/fb5cc65f973661241e4a2b7390b429aa7b330c69) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2006-3272, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2006-3272 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2006-3272
- **State**: PUBLISHED
- **Published Date**: June 28, 2006 at 22:00 UTC
- **Last Updated**: August 07, 2024 at 18:23 UTC
- **Reserved Date**: June 28, 2006 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in menu.php in Some Chess 1.5 rc2 allows remote attackers to conduct actions as another user, such as changing usernames and passwords, via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20770](http://secunia.com/advisories/20770)
2. [somechess-menu-xss(27307)](https://exchange.xforce.ibmcloud.com/vulnerabilities/27307) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-53085, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-53085 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-53085
- **State**: PUBLISHED
- **Published Date**: November 19, 2024 at 17:45 UTC
- **Last Updated**: May 04, 2025 at 13:00 UTC
- **Reserved Date**: November 19, 2024 at 17:17 UTC
- **Assigned By**: Linux
### Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
tpm: Lock TPM chip in tpm_pm_suspend() first
Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.
Aadress this by locking the TPM chip before checking any chip->flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.
### Affected Products
**Linux - Linux**
Affected versions:
- 99d46450625590d410f86fe4660a5eff7d3b8343 (Status: affected)
- 99d46450625590d410f86fe4660a5eff7d3b8343 (Status: affected)
- 99d46450625590d410f86fe4660a5eff7d3b8343 (Status: affected)
- 7cd46930b8bf37b84777410ac21bfdf1179021d5 (Status: affected)
- eeda114c92c7b2db69878cdf27163750fd57cfe2 (Status: affected)
**Linux - Linux**
Affected versions:
- 6.4 (Status: affected)
- 0 (Status: unaffected)
- 6.6.64 (Status: unaffected)
- 6.11.8 (Status: unaffected)
- 6.12 (Status: unaffected)
### References
1. [](https://git.kernel.org/stable/c/cfaf83501a0cbb104499c5b0892ee5ebde4e967f)
2. [](https://git.kernel.org/stable/c/bc203fe416abdd1c29da594565a7c3c4e979488e)
3. [](https://git.kernel.org/stable/c/9265fed6db601ee2ec47577815387458ef4f047a) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2007-6312, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2007-6312 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2007-6312
- **State**: PUBLISHED
- **Published Date**: December 11, 2007 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 16:02 UTC
- **Reserved Date**: December 11, 2007 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the logon page in Web Reporting Tools portal in Websense Enterprise and Web Security Suite 6.3 allows remote attackers to inject arbitrary web script or HTML via the username field.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [26793](http://www.securityfocus.com/bid/26793)
2. [](http://www.websense.com/SupportPortal/SupportKbs/1840.aspx)
3. [20071210 Advisory: Websense XSS Vulnerability](http://www.securityfocus.com/archive/1/484824/100/0/threaded)
4. [](http://www.liquidmatrix.org/blog/2007/12/10/advisory-websense-xss-vulnerability/)
5. [ADV-2007-4158](http://www.vupen.com/english/advisories/2007/4158)
6. [1019066](http://www.securitytracker.com/id?1019066)
7. [3432](http://securityreason.com/securityalert/3432)
8. [28019](http://secunia.com/advisories/28019)
9. [websenseenterprise-logon-page-xss(38936)](https://exchange.xforce.ibmcloud.com/vulnerabilities/38936) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-6187, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-6187 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-6187
- **State**: REJECTED
- **Published Date**: January 02, 2014 at 11:00 UTC
- **Last Updated**: January 02, 2014 at 05:57 UTC
- **Reserved Date**: October 21, 2013 at 00:00 UTC
- **Assigned By**: dell
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-31571, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-31571 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-31571
- **State**: PUBLISHED
- **Published Date**: July 11, 2022 at 01:00 UTC
- **Last Updated**: August 03, 2024 at 07:19 UTC
- **Reserved Date**: May 23, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The akashtalole/python-flask-restful-api repository through 2019-09-16 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/github/securitylab/issues/669#issuecomment-1117265726) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-12821, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-12821 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-12821
- **State**: PUBLISHED
- **Published Date**: October 17, 2018 at 18:00 UTC
- **Last Updated**: August 05, 2024 at 08:45 UTC
- **Reserved Date**: June 25, 2018 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Digital Editions versions 4.5.8 and below have an out of bounds read vulnerability. Successful exploitation could lead to information disclosure.
### Affected Products
**Adobe - Adobe Digital Editions**
Affected versions:
- 4.5.8 and below versions (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/Digital-Editions/apsb18-27.html)
2. [105532](http://www.securityfocus.com/bid/105532) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-16060, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-16060 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-16060
- **State**: PUBLISHED
- **Published Date**: September 06, 2019 at 18:15 UTC
- **Last Updated**: August 05, 2024 at 01:03 UTC
- **Reserved Date**: September 06, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/airbrake/airbrake-ruby/issues/468) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-0098, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-0098 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-0098
- **State**: PUBLISHED
- **Published Date**: May 09, 2024 at 22:16 UTC
- **Last Updated**: August 01, 2024 at 17:41 UTC
- **Reserved Date**: December 02, 2023 at 00:42 UTC
- **Assigned By**: nvidia
### Vulnerability Description
NVIDIA ChatRTX for Windows contains a vulnerability in the ChatRTX UI and backend, where a user can cause a clear-text transmission of sensitive information issue by data sniffing. A successful exploit of this vulnerability might lead to information disclosure.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-319: Security Weakness
### Affected Products
**nvidia - ChatRTX**
Affected versions:
- All versions prior to and including 0.2.1 (Status: affected)
### References
1. [](https://nvidia.custhelp.com/app/answers/detail/a_id/5533) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-5489, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-5489 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-5489
- **State**: PUBLISHED
- **Published Date**: January 07, 2019 at 18:00 UTC
- **Last Updated**: August 04, 2024 at 19:54 UTC
- **Reserved Date**: January 07, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [106478](http://www.securityfocus.com/bid/106478)
2. [openSUSE-SU-2019:1479](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html)
3. [DSA-4465](https://www.debian.org/security/2019/dsa-4465)
4. [[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html)
5. [[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update](https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html)
6. [openSUSE-SU-2019:1570](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html)
7. [20190618 [SECURITY] [DSA 4465-1] linux security update](https://seclists.org/bugtraq/2019/Jun/26)
8. [openSUSE-SU-2019:1579](http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html)
9. [RHSA-2019:2043](https://access.redhat.com/errata/RHSA-2019:2043)
10. [RHSA-2019:2029](https://access.redhat.com/errata/RHSA-2019:2029)
11. [RHSA-2019:2473](https://access.redhat.com/errata/RHSA-2019:2473)
12. [RHSA-2019:2808](https://access.redhat.com/errata/RHSA-2019:2808)
13. [RHSA-2019:2837](https://access.redhat.com/errata/RHSA-2019:2837)
14. [RHSA-2019:2809](https://access.redhat.com/errata/RHSA-2019:2809)
15. [RHSA-2019:3309](https://access.redhat.com/errata/RHSA-2019:3309)
16. [RHSA-2019:3517](https://access.redhat.com/errata/RHSA-2019:3517)
17. [RHSA-2019:3967](https://access.redhat.com/errata/RHSA-2019:3967)
18. [RHSA-2019:4058](https://access.redhat.com/errata/RHSA-2019:4058)
19. [RHSA-2019:4057](https://access.redhat.com/errata/RHSA-2019:4057)
20. [RHSA-2019:4056](https://access.redhat.com/errata/RHSA-2019:4056)
21. [RHSA-2019:4159](https://access.redhat.com/errata/RHSA-2019:4159)
22. [RHSA-2019:4164](https://access.redhat.com/errata/RHSA-2019:4164)
23. [RHSA-2019:4255](https://access.redhat.com/errata/RHSA-2019:4255)
24. [RHSA-2020:0204](https://access.redhat.com/errata/RHSA-2020:0204)
25. [](https://www.oracle.com/security-alerts/cpujul2020.html)
26. [](https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/)
27. [](https://bugzilla.suse.com/show_bug.cgi?id=1120843)
28. [](https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e)
29. [](https://arxiv.org/abs/1901.01161)
30. [](https://security.netapp.com/advisory/ntap-20190307-0001/)
31. [](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e)
32. [](http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-48800, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-48800 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-48800
- **State**: PUBLISHED
- **Published Date**: December 04, 2023 at 00:00 UTC
- **Last Updated**: August 02, 2024 at 21:46 UTC
- **Reserved Date**: November 20, 2023 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In TOTOLINK X6000R_Firmware V9.4.0cu.852_B20230719, the shttpd file sub_417338 function obtains fields from the front-end, connects them through the snprintf function, and passes them to the CsteSystem function, resulting in a command execution vulnerability.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.notion.so/X6000R-sub_417338-ad96548d06c645738daf3ab77575fd74?pvs=4)
2. [](https://palm-jump-676.notion.site/CVE-2023-48800-ad96548d06c645738daf3ab77575fd74) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-5760, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-5760 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-5760
- **State**: PUBLISHED
- **Published Date**: September 11, 2024 at 15:18 UTC
- **Last Updated**: September 11, 2024 at 17:22 UTC
- **Reserved Date**: June 07, 2024 at 18:46 UTC
- **Assigned By**: hp
### Vulnerability Description
The Samsung Universal Print Driver for Windows is potentially vulnerable to escalation of privilege allowing the creation of a reverse shell in the tool. This is only applicable for products in the application released or manufactured before 2018.
### Affected Products
**HP Inc. - Samsung Universal Print Driver**
Affected versions:
- 3.00.16.0101 (Status: affected)
### References
1. [](https://support.hp.com/us-en/document/ish_11159589-11159645-16/hpsbpi03970) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2013-1642, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2013-1642 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2013-1642
- **State**: PUBLISHED
- **Published Date**: January 02, 2020 at 20:18 UTC
- **Last Updated**: August 06, 2024 at 15:13 UTC
- **Reserved Date**: February 10, 2013 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in QuiXplorer before 2.5.5 allow remote attackers to inject arbitrary web script or HTML via the (1) dir, (2) item, (3) order, (4) searchitem, (5) selitems[], or (6) srt parameter to index.php or (7) the QUERY_STRING to index.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/realtimeprojects/quixplorer)
2. [](https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt)
3. [](https://exchange.xforce.ibmcloud.com/vulnerabilities/89056) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-0600, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-0600 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-0600
- **State**: PUBLISHED
- **Published Date**: March 17, 2025 at 13:49 UTC
- **Last Updated**: March 17, 2025 at 14:15 UTC
- **Reserved Date**: January 20, 2025 at 08:35 UTC
- **Assigned By**: 3DS
### Vulnerability Description
A stored Cross-site Scripting (XSS) vulnerability affecting Product Explorer in ENOVIA Collaborative Industry Innovator on Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
### CVSS Metrics
- **CVSS Base Score**: 8.7/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Dassault Systèmes - ENOVIA Collaborative Industry Innovator**
Affected versions:
- Release 3DEXPERIENCE R2024x Golden (Status: affected)
### References
1. [](https://www.3ds.com/vulnerability/advisories) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-43817, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-43817 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-43817
- **State**: PUBLISHED
- **Published Date**: December 13, 2021 at 19:45 UTC
- **Last Updated**: August 04, 2024 at 04:03 UTC
- **Reserved Date**: November 16, 2021 at 00:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Collabora Online is a collaborative online office suite based on LibreOffice technology. In affected versions a reflected XSS vulnerability was found in Collabora Online. An attacker could inject unescaped HTML into a variable as they created the Collabora Online iframe, and execute scripts inside the context of the Collabora Online iframe. This would give access to a small set of user settings stored in the browser, as well as the session's authentication token which was also passed in at iframe creation time. Users should upgrade to Collabora Online 6.4.16 or higher or Collabora Online 4.2.20 or higher. Collabora Online Development Edition 21.11 is not affected.
### CVSS Metrics
- **CVSS Base Score**: 8.2/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**CollaboraOnline - online**
Affected versions:
- >= 6.0.0, < 6.4.16 (Status: affected)
- < 4.2.20 (Status: affected)
### References
1. [](https://github.com/CollaboraOnline/online/security/advisories/GHSA-7f6h-v9mx-58q9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-8993, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-8993 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-8993
- **State**: PUBLISHED
- **Published Date**: March 14, 2017 at 22:00 UTC
- **Last Updated**: August 06, 2024 at 08:36 UTC
- **Reserved Date**: February 27, 2017 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Malicious file execution vulnerability in Intel Security CloudAV (Beta) before 0.5.0.151.3 allows attackers to make the product momentarily vulnerable via executing preexisting specifically crafted malware during installation or uninstallation, but not during normal operation.
### Affected Products
**Intel - CloudAV (Beta)**
Affected versions:
- before 0.5.0.151.3 (Status: affected)
### References
1. [](https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102462) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2012-4722, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2012-4722 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2012-4722
- **State**: REJECTED
- **Published Date**: March 15, 2017 at 18:00 UTC
- **Last Updated**: March 15, 2017 at 17:57 UTC
- **Reserved Date**: August 28, 2012 at 00:00 UTC
- **Assigned By**: icscert
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2018-5211, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2018-5211 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2018-5211
- **State**: PUBLISHED
- **Published Date**: January 09, 2018 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 05:26 UTC
- **Reserved Date**: January 04, 2018 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
PHP Melody version 2.7.1 suffer from SQL Injection Time-based attack on the page ajax.php with the parameter playlist.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [43409](https://www.exploit-db.com/exploits/43409/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-21988, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-21988 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-21988
- **State**: PUBLISHED
- **Published Date**: February 09, 2022 at 16:36 UTC
- **Last Updated**: January 02, 2025 at 18:28 UTC
- **Reserved Date**: December 16, 2021 at 00:00 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Microsoft Office Visio Remote Code Execution Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 7.8/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Affected Products
**Microsoft - Microsoft Office 2019**
Affected versions:
- 19.0.0 (Status: affected)
**Microsoft - Microsoft 365 Apps for Enterprise**
Affected versions:
- 16.0.1 (Status: affected)
**Microsoft - Microsoft Office LTSC 2021**
Affected versions:
- 16.0.1 (Status: affected)
### References
1. [Microsoft Office Visio Remote Code Execution Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21988) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-35693, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-35693 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-35693
- **State**: PUBLISHED
- **Published Date**: December 24, 2020 at 18:02 UTC
- **Last Updated**: August 04, 2024 at 17:09 UTC
- **Reserved Date**: December 24, 2020 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly StopCovid). As part of the pairing process, two pieces (among others) of personally identifiable information are exchanged: the Identity Address of the Bluetooth adapter of the target device, and its associated Identity Resolving Key (IRK). Either one of these identifiers can be used to perform re-identification of the target device for long term tracking. The list of affected devices includes (but is not limited to): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4, and Galaxy S5.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/alwentiu/contact-tracing-research/blob/main/samsung.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-21640, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-21640 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-21640
- **State**: PUBLISHED
- **Published Date**: January 13, 2024 at 07:40 UTC
- **Last Updated**: August 01, 2024 at 22:27 UTC
- **Reserved Date**: December 29, 2023 at 03:00 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
Chromium Embedded Framework (CEF) is a simple framework for embedding Chromium-based browsers in other applications.`CefVideoConsumerOSR::OnFrameCaptured` does not check `pixel_format` properly, which leads to out-of-bounds read out of the sandbox. This vulnerability was patched in commit 1f55d2e.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**chromiumembedded - cef**
Affected versions:
- < commit 1f55d2e (Status: affected)
### References
1. [https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh](https://github.com/chromiumembedded/cef/security/advisories/GHSA-3h3j-38xq-v7hh)
2. [https://github.com/chromiumembedded/cef/commit/1f55d2e12f62cfdfbf9da6968fde2f928982670b](https://github.com/chromiumembedded/cef/commit/1f55d2e12f62cfdfbf9da6968fde2f928982670b) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2005-3227, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2005-3227 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2005-3227
- **State**: PUBLISHED
- **Published Date**: October 14, 2005 at 04:00 UTC
- **Last Updated**: August 07, 2024 at 23:01 UTC
- **Reserved Date**: October 14, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Multiple interpretation error in unspecified versions of UNA Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://shadock.net/secubox/AVCraftedArchive.html)
2. [20051007 Antivirus detection bypass by special crafted archive.](http://marc.info/?l=bugtraq&m=112879611919750&w=2) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-36917, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-36917 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-36917
- **State**: PUBLISHED
- **Published Date**: November 24, 2021 at 16:19 UTC
- **Last Updated**: March 28, 2025 at 16:47 UTC
- **Reserved Date**: July 19, 2021 at 00:00 UTC
- **Assigned By**: Patchstack
### Vulnerability Description
WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a reset token which can then be used to deactivate the plugin.
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
### Affected Products
**wpWave - Hide My WP (WordPress plugin)**
Affected versions:
- <= 6.2.3 (Status: affected)
### References
1. [](https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158)
2. [](https://patchstack.com/hide-my-wp-vulnerabilities-fixed/)
3. [](https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-unauthenticated-plugin-deactivation-vulnerability)
### Credits
- Vulnerability discovered by Dave Jong (Patchstack). |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-8741, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-8741 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-8741
- **State**: PUBLISHED
- **Published Date**: February 28, 2020 at 13:01 UTC
- **Last Updated**: August 04, 2024 at 21:24 UTC
- **Reserved Date**: February 18, 2019 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
A denial of service issue was addressed with improved input validation.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://eprint.iacr.org/2019/1421)
2. [](https://support.apple.com/HT210635)
3. [](https://support.apple.com/HT210636)
4. [](https://support.apple.com/HT210637)
5. [](https://support.apple.com/HT210606)
6. [](https://support.apple.com/HT210634)
7. [](https://support.apple.com/HT210604)
8. [](https://support.apple.com/HT210607) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2004-1482, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2004-1482 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2004-1482
- **State**: PUBLISHED
- **Published Date**: February 13, 2005 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 00:53 UTC
- **Reserved Date**: February 13, 2005 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The sbuf_getmsg function in BNC incorrectly handles backspace characters, which could allow remote attackers to bypass authentication and gain access to arbitrary scripts.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [11355](http://www.securityfocus.com/bid/11355)
2. [12770](http://secunia.com/advisories/12770/)
3. [GLSA-200410-13](http://www.gentoo.org/security/en/glsa/glsa-200410-13.xml)
4. [bnc-backspace-command-execution(17672)](https://exchange.xforce.ibmcloud.com/vulnerabilities/17672)
5. [10596](http://www.osvdb.org/10596)
6. [](http://www.gotbnc.com/changes.html#2.8.9) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-26185, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-26185 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-26185
- **State**: PUBLISHED
- **Published Date**: March 12, 2024 at 16:58 UTC
- **Last Updated**: May 03, 2025 at 00:47 UTC
- **Reserved Date**: February 14, 2024 at 22:23 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows Compressed Folder Tampering Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 6.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-73: Security Weakness
### Affected Products
**Microsoft - Windows 11 version 22H2**
Affected versions:
- 10.0.22621.0 (Status: affected)
**Microsoft - Windows 11 version 22H3**
Affected versions:
- 10.0.22631.0 (Status: affected)
**Microsoft - Windows 11 Version 23H2**
Affected versions:
- 10.0.22631.0 (Status: affected)
### References
1. [Windows Compressed Folder Tampering Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26185) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-44471, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-44471 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-44471
- **State**: PUBLISHED
- **Published Date**: December 21, 2022 at 01:21 UTC
- **Last Updated**: April 23, 2025 at 16:24 UTC
- **Reserved Date**: October 31, 2022 at 00:00 UTC
- **Assigned By**: adobe
### Vulnerability Description
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**Adobe - Experience Manager**
Affected versions:
- unspecified (Status: affected)
- unspecified (Status: affected)
### References
1. [](https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2011-4777, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2011-4777 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2011-4777
- **State**: PUBLISHED
- **Published Date**: December 16, 2011 at 11:00 UTC
- **Last Updated**: September 16, 2024 at 20:51 UTC
- **Reserved Date**: December 13, 2011 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Site Editor (aka SiteBuilder) feature in Parallels Plesk Panel 10.4.4_build20111103.18 allows remote attackers to inject arbitrary web script or HTML via the login parameter to preferences.html.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-39141, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-39141 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-39141
- **State**: PUBLISHED
- **Published Date**: September 13, 2022 at 09:40 UTC
- **Last Updated**: August 03, 2024 at 11:10 UTC
- **Reserved Date**: September 01, 2022 at 00:00 UTC
- **Assigned By**: siemens
### Vulnerability Description
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application is vulnerable to out of bounds read past the end of an allocated buffer when parsing X_T files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-17296)
### Weakness Classification (CWE)
- CWE-125: Out-of-bounds Read
### Affected Products
**Siemens - Parasolid V33.1**
Affected versions:
- All versions < V33.1.262 (Status: affected)
**Siemens - Parasolid V34.0**
Affected versions:
- All versions < V34.0.252 (Status: affected)
**Siemens - Parasolid V34.1**
Affected versions:
- All versions < V34.1.242 (Status: affected)
**Siemens - Parasolid V35.0**
Affected versions:
- All versions < V35.0.161 (Status: affected)
**Siemens - Simcenter Femap V2022.1**
Affected versions:
- All versions < V2022.1.3 (Status: affected)
**Siemens - Simcenter Femap V2022.2**
Affected versions:
- All versions < V2022.2.2 (Status: affected)
### References
1. [](https://cert-portal.siemens.com/productcert/pdf/ssa-518824.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-9984, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-9984 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-9984
- **State**: PUBLISHED
- **Published Date**: October 22, 2020 at 18:06 UTC
- **Last Updated**: August 04, 2024 at 10:50 UTC
- **Reserved Date**: March 02, 2020 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
### Affected Products
**Apple - iOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - tvOS**
Affected versions:
- unspecified (Status: affected)
**Apple - watchOS**
Affected versions:
- unspecified (Status: affected)
**Apple - iTunes for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows**
Affected versions:
- unspecified (Status: affected)
**Apple - iCloud for Windows (Legacy)**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/kb/HT211289)
2. [](https://support.apple.com/kb/HT211288)
3. [](https://support.apple.com/kb/HT211290)
4. [](https://support.apple.com/kb/HT211291)
5. [](https://support.apple.com/kb/HT211293)
6. [](https://support.apple.com/kb/HT211294)
7. [](https://support.apple.com/kb/HT211295) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-1617, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-1617 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-1617
- **State**: PUBLISHED
- **Published Date**: April 29, 2010 at 21:00 UTC
- **Last Updated**: August 07, 2024 at 01:28 UTC
- **Reserved Date**: April 29, 2010 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
user/view.php in Moodle 1.8.x before 1.8.12 and 1.9.x before 1.9.8 does not properly check a role, which allows remote authenticated users to obtain the full names of other users via the course profile page.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://cvs.moodle.org/moodle/user/view.php?r1=1.168.2.28&r2=1.168.2.29)
2. [ADV-2010-1107](http://www.vupen.com/english/advisories/2010/1107)
3. [](http://moodle.org/security/)
4. [SUSE-SR:2010:011](http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-21923, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-21923 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-21923
- **State**: PUBLISHED
- **Published Date**: April 18, 2023 at 19:54 UTC
- **Last Updated**: September 16, 2024 at 19:22 UTC
- **Reserved Date**: December 17, 2022 at 19:26 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Health Sciences InForm accessible data as well as unauthorized access to critical data or complete access to all Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L).
### CVSS Metrics
- **CVSS Base Score**: 8.3/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`
### Affected Products
**Oracle Corporation - Health Sciences InForm**
Affected versions:
- * (Status: affected)
- * (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpuapr2023.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-35638, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-35638 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-35638
- **State**: PUBLISHED
- **Published Date**: October 20, 2021 at 10:51 UTC
- **Last Updated**: September 25, 2024 at 19:22 UTC
- **Reserved Date**: June 28, 2021 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H`
### Affected Products
**Oracle Corporation - MySQL Server**
Affected versions:
- 8.0.26 and prior (Status: affected)
### References
1. [](https://www.oracle.com/security-alerts/cpuoct2021.html)
2. [](https://security.netapp.com/advisory/ntap-20211022-0003/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-0905, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-0905 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-0905
- **State**: PUBLISHED
- **Published Date**: July 13, 2010 at 22:07 UTC
- **Last Updated**: August 07, 2024 at 01:06 UTC
- **Reserved Date**: March 03, 2010 at 00:00 UTC
- **Assigned By**: oracle
### Vulnerability Description
Unspecified vulnerability in the Oracle Applications Manager component in Oracle E-Business Suite 11.5.10.2 and 12.0.4 allows remote attackers to affect integrity via unknown vectors.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2020-8696, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2020-8696 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2020-8696
- **State**: PUBLISHED
- **Published Date**: November 12, 2020 at 18:02 UTC
- **Last Updated**: August 04, 2024 at 10:03 UTC
- **Reserved Date**: February 06, 2020 at 00:00 UTC
- **Assigned By**: intel
### Vulnerability Description
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
### Affected Products
**n/a - Intel(R) Processors**
Affected versions:
- See references (Status: affected)
### References
1. [](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381)
2. [](https://security.netapp.com/advisory/ntap-20201113-0006/)
3. [FEDORA-2020-14fda1bf85](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/)
4. [[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update](https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2016-10960, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2016-10960 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2016-10960
- **State**: PUBLISHED
- **Published Date**: September 16, 2019 at 12:22 UTC
- **Last Updated**: August 06, 2024 at 03:47 UTC
- **Reserved Date**: September 13, 2019 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://wordpress.org/plugins/wsecure/#developers)
2. [](https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-2456, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-2456 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-2456
- **State**: PUBLISHED
- **Published Date**: August 05, 2022 at 15:10 UTC
- **Last Updated**: August 03, 2024 at 00:39 UTC
- **Reserved Date**: July 18, 2022 at 00:00 UTC
- **Assigned By**: GitLab
### Vulnerability Description
An issue has been discovered in GitLab CE/EE affecting all versions before 15.0.5, all versions starting from 15.1 before 15.1.4, all versions starting from 15.2 before 15.2.1. It may be possible for malicious group or project maintainers to change their corresponding group or project visibility by crafting a malicious POST request.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Affected Products
**GitLab - GitLab**
Affected versions:
- >=15.2, <15.2.1 (Status: affected)
- >=15.1, <15.1.4 (Status: affected)
- >=0.0, <15.0.5 (Status: affected)
### References
1. [](https://gitlab.com/gitlab-org/gitlab/-/issues/359910)
2. [](https://hackerone.com/reports/1536559)
3. [](https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2456.json)
### Credits
- Thanks [suruli](https://hackerone.com/suruli) for reporting this vulnerability through our HackerOne bug bounty program. |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-6574, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-6574 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-6574
- **State**: PUBLISHED
- **Published Date**: December 15, 2016 at 00:00 UTC
- **Last Updated**: August 06, 2024 at 07:22 UTC
- **Reserved Date**: August 21, 2015 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The SNAP Lite component in certain SISCO MMS-EASE and AX-S4 ICCP products allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [95022](http://www.securityfocus.com/bid/95022)
2. [](https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2015-6574/)
3. [](https://www.sisconet.com/wp-content/uploads/2016/04/SecNote_CVE-2015-6574-Portcullis-20160426.pdf)
4. [](https://cert-portal.siemens.com/productcert/pdf/ssa-223771.pdf) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-24113, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-24113 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-24113
- **State**: PUBLISHED
- **Published Date**: January 27, 2025 at 21:45 UTC
- **Last Updated**: January 31, 2025 at 21:40 UTC
- **Reserved Date**: January 17, 2025 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
The issue was addressed with improved UI. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. Visiting a malicious website may lead to user interface spoofing.
### Affected Products
**Apple - visionOS**
Affected versions:
- unspecified (Status: affected)
**Apple - macOS**
Affected versions:
- unspecified (Status: affected)
**Apple - Safari**
Affected versions:
- unspecified (Status: affected)
**Apple - iOS and iPadOS**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://support.apple.com/en-us/122073)
2. [](https://support.apple.com/en-us/122068)
3. [](https://support.apple.com/en-us/122074)
4. [](https://support.apple.com/en-us/122066) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-3414, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-3414 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-3414
- **State**: PUBLISHED
- **Published Date**: May 29, 2014 at 14:00 UTC
- **Last Updated**: August 06, 2024 at 10:43 UTC
- **Reserved Date**: May 07, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in Sharetronix before 3.4 allows remote attackers to hijack the authentication of administrators for requests that add administrative privileges to a user via the admin parameter to admin/administrators.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.htbridge.com/advisory/HTB23214)
2. [](http://packetstormsecurity.com/files/126859/Sharetronix-3.3-Cross-Site-Request-Forgery-SQL-Injection.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2010-2938, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2010-2938 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2010-2938
- **State**: PUBLISHED
- **Published Date**: October 08, 2010 at 20:00 UTC
- **Last Updated**: August 07, 2024 at 02:55 UTC
- **Reserved Date**: August 04, 2010 at 00:00 UTC
- **Assigned By**: redhat
### Vulnerability Description
arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [RHSA-2010:0723](http://www.redhat.com/support/errata/RHSA-2010-0723.html)
2. [20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console](http://www.securityfocus.com/archive/1/520102/100/0/threaded)
3. [43578](http://www.securityfocus.com/bid/43578)
4. [46397](http://secunia.com/advisories/46397)
5. [](http://xenbits.xensource.com/xen-unstable.hg?rev/15911)
6. [](http://www.vmware.com/security/advisories/VMSA-2011-0012.html)
7. [](http://support.avaya.com/css/P8/documents/100113326)
8. [](https://bugzilla.redhat.com/show_bug.cgi?id=620490) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-41322, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-41322 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-41322
- **State**: PUBLISHED
- **Published Date**: September 26, 2023 at 22:34 UTC
- **Last Updated**: September 23, 2024 at 20:21 UTC
- **Reserved Date**: August 28, 2023 at 16:56 UTC
- **Assigned By**: GitHub_M
### Vulnerability Description
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.
### CVSS Metrics
- **CVSS Base Score**: 4.9/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N`
### Weakness Classification (CWE)
- CWE-284: Security Weakness
- CWE-269: Security Weakness
### Affected Products
**glpi-project - glpi**
Affected versions:
- >= 9.1.0, < 10.0.10 (Status: affected)
### References
1. [https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr](https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-47496, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-47496 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-47496
- **State**: PUBLISHED
- **Published Date**: October 11, 2024 at 15:28 UTC
- **Last Updated**: October 11, 2024 at 17:42 UTC
- **Reserved Date**: September 25, 2024 at 15:26 UTC
- **Assigned By**: juniper
### Vulnerability Description
A NULL Pointer Dereference vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a local, low-privileged attacker to cause a Denial-of-Service (DoS).
When a specific command is executed, the pfe crashes. This will cause traffic forwarding to be interrupted until the system self-recovers. Repeated execution will create a sustained DoS condition.
This issue only affects MX Series devices with Line cards MPC1-MPC9.
This issue affects:
Junos OS on MX Series:
* All versions before 21.4R3-S9,
* from 22.2 before 22.2R3-S5,
* from 22.3 before 22.3R3-S4,
* from 22.4 before 22.4R3-S2,
* from 23.2 before 23.2R2-S1,
* from 23.4 before 23.4R2.
### CVSS Metrics
- **CVSS Base Score**: 5.5/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H`
### Weakness Classification (CWE)
- CWE-476: NULL Pointer Dereference
### Affected Products
**Juniper Networks - Junos OS**
Affected versions:
- 0 (Status: affected)
- 22.2 (Status: affected)
- 22.3 (Status: affected)
- 22.4 (Status: affected)
- 23.2 (Status: affected)
- 23.4 (Status: affected)
### References
1. [](https://supportportal.juniper.net/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-20952, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-20952 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-20952
- **State**: PUBLISHED
- **Published Date**: January 16, 2024 at 21:41 UTC
- **Last Updated**: February 13, 2025 at 17:32 UTC
- **Reserved Date**: December 07, 2023 at 22:28 UTC
- **Assigned By**: oracle
### Vulnerability Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
### CVSS Metrics
- **CVSS Base Score**: 7.4/10.0
- **Severity**: HIGH
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N`
### Affected Products
**Oracle Corporation - Java SE JDK and JRE**
Affected versions:
- Oracle Java SE:8u391 (Status: affected)
- Oracle Java SE:8u391-perf (Status: affected)
- Oracle Java SE:11.0.21 (Status: affected)
- Oracle Java SE:17.0.9 (Status: affected)
- Oracle Java SE:21.0.1 (Status: affected)
- Oracle GraalVM for JDK:17.0.9 (Status: affected)
- Oracle GraalVM for JDK:21.0.1 (Status: affected)
- Oracle GraalVM Enterprise Edition:20.3.12 (Status: affected)
- Oracle GraalVM Enterprise Edition:21.3.8 (Status: affected)
- Oracle GraalVM Enterprise Edition:22.3.4 (Status: affected)
### References
1. [Oracle Advisory](https://www.oracle.com/security-alerts/cpujan2024.html)
2. [](https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html)
3. [](https://security.netapp.com/advisory/ntap-20240201-0002/) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2001-1024, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2001-1024 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2001-1024
- **State**: PUBLISHED
- **Published Date**: February 02, 2002 at 05:00 UTC
- **Last Updated**: August 08, 2024 at 04:44 UTC
- **Reserved Date**: January 31, 2002 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
login.gas.bat and other CGI scripts in Entrust getAccess allow remote attackers to execute Java programs, and possibly arbitrary commands, by specifying an alternate -classpath argument.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20010727 Entrust - getAccess](http://archives.neohapsis.com/archives/bugtraq/2001-07/0662.html)
2. [entrust-getaccess-execute-commands(6915)](https://exchange.xforce.ibmcloud.com/vulnerabilities/6915) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-28909, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-28909 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-28909
- **State**: PUBLISHED
- **Published Date**: September 09, 2021 at 17:35 UTC
- **Last Updated**: August 03, 2024 at 21:55 UTC
- **Reserved Date**: March 19, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers to access uncontrolled the login service at /webif/SecurityModule in a brute force attack. The password could be weak and default username is known as 'admin'. This is usable and part of an attack chain to gain SSH root access.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://psytester.github.io/CVE-2021-28909) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-1429, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-1429 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-1429
- **State**: REJECTED
- **Published Date**: May 11, 2017 at 14:01 UTC
- **Last Updated**: May 11, 2017 at 13:57 UTC
- **Reserved Date**: January 13, 2014 at 00:00 UTC
- **Assigned By**: canonical
### Vulnerability Description
No description available |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-14121, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-14121 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-14121
- **State**: PUBLISHED
- **Published Date**: September 03, 2017 at 20:00 UTC
- **Last Updated**: August 05, 2024 at 19:20 UTC
- **Reserved Date**: September 03, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
The DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a crafted RAR archive. NOTE: this may be the same as one of the several test cases in the CVE-2017-11189 references.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://bugs.debian.org/874061)
2. [](http://www.openwall.com/lists/oss-security/2017/08/20/1)
3. [[debian-lts-announce] 20210218 [SECURITY] [DLA 2567-1] unrar-free security update](https://lists.debian.org/debian-lts-announce/2021/02/msg00026.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2019-9853, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2019-9853 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2019-9853
- **State**: PUBLISHED
- **Published Date**: September 27, 2019 at 15:07 UTC
- **Last Updated**: September 16, 2024 at 17:17 UTC
- **Reserved Date**: March 17, 2019 at 00:00 UTC
- **Assigned By**: Document Fdn.
### Vulnerability Description
LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.
### Weakness Classification (CWE)
- CWE-116: Security Weakness
### Affected Products
**Document Foundation - LibreOffice**
Affected versions:
- 6.2 series (Status: affected)
- 6.3 series (Status: affected)
### References
1. [](https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/)
2. [[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update](https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html)
3. [FEDORA-2019-4b0cc75996](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/)
4. [[openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226%40%3Ccommits.openoffice.apache.org%3E)
5. [[openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f%40%3Ccommits.openoffice.apache.org%3E)
6. [[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html](https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E)
7. [[openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a%40%3Ccommits.openoffice.apache.org%3E)
8. [[openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43%40%3Ccommits.openoffice.apache.org%3E)
9. [[openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c%40%3Ccommits.openoffice.apache.org%3E)
10. [[openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html](https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926%40%3Ccommits.openoffice.apache.org%3E)
11. [[openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html](https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69%40%3Ccommits.openoffice.apache.org%3E)
12. [[openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html](https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683%40%3Ccommits.openoffice.apache.org%3E)
13. [[openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html](https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e%40%3Ccommits.openoffice.apache.org%3E)
14. [[openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html](https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631%40%3Ccommits.openoffice.apache.org%3E)
15. [openSUSE-SU-2019:2709](http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html)
16. [20200220 Open-Xchange Security Advisory 2020-02-19](http://seclists.org/fulldisclosure/2020/Feb/23)
17. [](http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html)
### Credits
- Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25162, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25162 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25162
- **State**: PUBLISHED
- **Published Date**: May 18, 2022 at 16:34 UTC
- **Last Updated**: August 03, 2024 at 04:29 UTC
- **Reserved Date**: February 14, 2022 at 00:00 UTC
- **Assigned By**: Mitsubishi
### Vulnerability Description
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior and versions prior to 1.073, MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 179**** and prior and versions prior to 1.073, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS) versions prior to 1.030, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/ES-A(x=24,40,60, y=T,R) versions prior to 1.031 and Mitsubishi Electric MELSEC iQ-F series FX5S-xMy/z(x=30,40,60,80, y=T,R, z=ES,ESS) version 1.000 allows a remote unauthenticated attacker to cause a temporary DoS condition for the product's communication by sending specially crafted packets.
### Affected Products
**n/a - Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS); Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS); Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS; Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS; Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS; Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS); Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/ES-A(x=24,40,60, y=T,R); Mitsubishi Electric MELSEC iQ-F series FX5S-xMy/z(x=30,40,60,80, y=T,R, z=ES,ESS)**
Affected versions:
- Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later and versions prior to 1.270 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior and versions prior to 1.073 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 17X**** or later and versions prior to 1.270 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 179**** and prior and versions prior to 1.073 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS versions prior to 1.270 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS versions prior to 1.270 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS versions prior to 1.270 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS) versions prior to 1.030 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/ES-A(x=24,40,60, y=T,R) versions prior to 1.031 (Status: affected)
- Mitsubishi Electric MELSEC iQ-F series FX5S-xMy/z(x=30,40,60,80, y=T,R, z=ES,ESS) version 1.000 (Status: affected)
### References
1. [](https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-004_en.pdf)
2. [](https://jvn.jp/vu/JVNVU95926817/index.html)
3. [](https://www.cisa.gov/uscert/ics/advisories/icsa-22-139-01) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2021-37605, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2021-37605 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2021-37605
- **State**: PUBLISHED
- **Published Date**: August 05, 2021 at 15:52 UTC
- **Last Updated**: August 04, 2024 at 01:23 UTC
- **Reserved Date**: July 28, 2021 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://www.microchip.com/product-change-notifications/#/)
2. [](https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol)
3. [](https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf)
4. [](https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads)
5. [](https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf)
6. [](https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-13731, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-13731 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-13731
- **State**: PUBLISHED
- **Published Date**: March 25, 2025 at 08:22 UTC
- **Last Updated**: March 25, 2025 at 13:14 UTC
- **Reserved Date**: January 24, 2025 at 19:51 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Alert Box Block – Display notice/alerts in the front end. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Alert Box block in all versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### CVSS Metrics
- **CVSS Base Score**: 6.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N`
### Weakness Classification (CWE)
- CWE-79: Cross-site Scripting (XSS)
### Affected Products
**bplugins - Alert Box Block – Display notice/alerts in the front end.**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/d63cd13e-4a16-483f-8165-6c8090ceebab?source=cve)
2. [](https://wordpress.org/plugins/alert-box-block/)
### Credits
- Nguyen Vuong Quoc
- Pham Van Tam
- Nguyen Khanh Hao |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2024-38461, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2024-38461 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2024-38461
- **State**: PUBLISHED
- **Published Date**: June 16, 2024 at 00:00 UTC
- **Last Updated**: October 30, 2024 at 19:06 UTC
- **Reserved Date**: June 16, 2024 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
irodsServerMonPerf in iRODS before 4.3.2 attempts to proceed with use of a path even if it is not a directory.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/irods/irods/issues/7652)
2. [](https://github.com/irods/irods/releases/tag/4.3.2)
3. [](https://irods.org/2024/05/irods-4-3-2-is-released) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-2734, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-2734 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-2734
- **State**: PUBLISHED
- **Published Date**: May 25, 2023 at 02:05 UTC
- **Last Updated**: January 13, 2025 at 16:47 UTC
- **Reserved Date**: May 16, 2023 at 12:41 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
### Affected Products
**inspireui - MStore API**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/5881d16c-84e8-4610-8233-cfa5a94fe3f9?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/mstore-api/tags/3.9.0/controllers/flutter-woo.php#L911)
3. [](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2915729%40mstore-api&old=2913397%40mstore-api&sfp_email=&sfph_mail=#file59)
### Credits
- Lana Codes |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2025-21311, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2025-21311 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2025-21311
- **State**: PUBLISHED
- **Published Date**: January 14, 2025 at 18:04 UTC
- **Last Updated**: April 02, 2025 at 13:24 UTC
- **Reserved Date**: December 10, 2024 at 23:54 UTC
- **Assigned By**: microsoft
### Vulnerability Description
Windows NTLM V1 Elevation of Privilege Vulnerability
### CVSS Metrics
- **CVSS Base Score**: 9.8/10.0
- **Severity**: CRITICAL
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C`
### Weakness Classification (CWE)
- CWE-303: Security Weakness
### Affected Products
**Microsoft - Windows Server 2025 (Server Core installation)**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2022, 23H2 Edition (Server Core installation)**
Affected versions:
- 10.0.25398.0 (Status: affected)
**Microsoft - Windows 11 Version 24H2**
Affected versions:
- 10.0.26100.0 (Status: affected)
**Microsoft - Windows Server 2025**
Affected versions:
- 10.0.26100.0 (Status: affected)
### References
1. [Windows NTLM V1 Elevation of Privilege Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2014-6616, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2014-6616 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2014-6616
- **State**: PUBLISHED
- **Published Date**: August 31, 2015 at 18:00 UTC
- **Last Updated**: August 06, 2024 at 12:24 UTC
- **Reserved Date**: September 18, 2014 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Cross-site scripting (XSS) vulnerability in Softing FG-100 PROFIBUS Single Channel (FG-100-PB) with firmware FG-x00-PB_V2.02.0.00 allows remote attackers to inject arbitrary web script or HTML via the DEVICE_NAME parameter to cgi-bin/CFGhttp/.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [20141105 CVE-2014-6616 Softing FG-100 Webui XSS](http://www.securityfocus.com/archive/1/533903/100/0/threaded)
2. [](http://packetstormsecurity.com/files/128975/Softing-FG-100-PB-Cross-Site-Scripting.html)
3. [70917](http://www.securityfocus.com/bid/70917) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2015-3776, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2015-3776 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2015-3776
- **State**: PUBLISHED
- **Published Date**: August 16, 2015 at 23:00 UTC
- **Last Updated**: August 06, 2024 at 05:56 UTC
- **Reserved Date**: May 07, 2015 at 00:00 UTC
- **Assigned By**: apple
### Vulnerability Description
IOKit in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption and application crash) via a malformed plist.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://support.apple.com/kb/HT205030)
2. [1033275](http://www.securitytracker.com/id/1033275)
3. [APPLE-SA-2015-08-13-2](http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html)
4. [APPLE-SA-2015-08-13-3](http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html)
5. [](https://support.apple.com/kb/HT205031)
6. [76343](http://www.securityfocus.com/bid/76343) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-40961, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-40961 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-40961
- **State**: PUBLISHED
- **Published Date**: December 22, 2022 at 00:00 UTC
- **Last Updated**: April 15, 2025 at 14:50 UTC
- **Reserved Date**: September 19, 2022 at 00:00 UTC
- **Assigned By**: mozilla
### Vulnerability Description
During startup, a graphics driver with an unexpected name could lead to a stack-buffer overflow causing a potentially exploitable crash.<br>*This issue only affects Firefox for Android. Other operating systems are not affected.*. This vulnerability affects Firefox < 105.
### Affected Products
**Mozilla - Firefox**
Affected versions:
- unspecified (Status: affected)
### References
1. [](https://www.mozilla.org/security/advisories/mfsa2022-40/)
2. [](https://bugzilla.mozilla.org/show_bug.cgi?id=1784588) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-0709, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-0709 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-0709
- **State**: PUBLISHED
- **Published Date**: June 09, 2023 at 05:33 UTC
- **Last Updated**: December 20, 2024 at 23:45 UTC
- **Reserved Date**: February 07, 2023 at 15:10 UTC
- **Assigned By**: Wordfence
### Vulnerability Description
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_last_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
### CVSS Metrics
- **CVSS Base Score**: 5.4/10.0
- **Severity**: MEDIUM
- **CVSS Vector**: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N`
### Affected Products
**xpeedstudio - Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress**
Affected versions:
- * (Status: affected)
### References
1. [](https://www.wordfence.com/threat-intel/vulnerabilities/id/25200656-a6a2-42f2-a607-26d4ff502cbf?source=cve)
2. [](https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078)
3. [](https://plugins.trac.wordpress.org/changeset/2907471/)
### Credits
- Ramuel Gall |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2022-25498, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2022-25498 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2022-25498
- **State**: PUBLISHED
- **Published Date**: March 15, 2022 at 17:29 UTC
- **Last Updated**: August 03, 2024 at 04:42 UTC
- **Reserved Date**: February 21, 2022 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
CuppaCMS v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the saveConfigData function in /classes/ajax/Functions.php.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](https://github.com/CuppaCMS/CuppaCMS/issues/29) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2017-11323, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2017-11323 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2017-11323
- **State**: PUBLISHED
- **Published Date**: August 19, 2017 at 16:00 UTC
- **Last Updated**: August 05, 2024 at 18:05 UTC
- **Reserved Date**: July 13, 2017 at 00:00 UTC
- **Assigned By**: mitre
### Vulnerability Description
Stack-based buffer overflow in ESTsoft ALZip 8.51 and earlier allows remote attackers to execute arbitrary code via a crafted MS-DOS device file, as demonstrated by use of "AUX" as the initial substring of a filename.
### Affected Products
**n/a - n/a**
Affected versions:
- n/a (Status: affected)
### References
1. [](http://www.altools.com/ALTools/ALZip/Version-History.aspx)
2. [](http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html) |
You are a cybersecurity expert specializing in penetration testing, vulnerability research, and exploit development. Provide comprehensive technical analysis of CVE vulnerabilities with academic rigor and practical exploitation insights. | Provide a comprehensive technical analysis of CVE-2023-39410, including exploitation vectors, impact assessment, and remediation strategies. | ## CVE-2023-39410 Vulnerability Details
### CVE Metadata
- **CVE ID**: CVE-2023-39410
- **State**: PUBLISHED
- **Published Date**: September 29, 2023 at 16:23 UTC
- **Last Updated**: February 13, 2025 at 17:03 UTC
- **Reserved Date**: July 31, 2023 at 17:55 UTC
- **Assigned By**: apache
### Vulnerability Description
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system.
This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
### Weakness Classification (CWE)
- CWE-502: Deserialization of Untrusted Data
### Affected Products
**Apache Software Foundation - Apache Avro Java SDK**
Affected versions:
- 0 (Status: affected)
### References
1. [](https://lists.apache.org/thread/q142wj99cwdd0jo5lvdoxzoymlqyjdds)
2. [](https://www.openwall.com/lists/oss-security/2023/09/29/6)
3. [](https://security.netapp.com/advisory/ntap-20240621-0006/)
### Credits
- Adam Korczynski at ADA Logics Ltd |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.